Anomaly Upload Behavior Detection Based on Fuzzy Inference

被引:2
|
作者
Han, Ting [1 ]
Zhan, Xuna [1 ]
Tao, Jing [2 ]
Cao, Ken [1 ]
Xiong, Yuheng [1 ]
机构
[1] Xi An Jiao Tong Univ, Minist Educ, Key Lab Intelligent Networks & Network Secur, Xian, Peoples R China
[2] Xi An Jiao Tong Univ, Minist Educ, Key Lab Intelligent Networks & Network Secur, Shenzhen Res Inst, Xian, Peoples R China
来源
2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021 | 2021年
基金
中国国家自然科学基金;
关键词
file upload; anomaly detection; fuzzy inference; membership function; SYSTEM;
D O I
10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00154
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly behavior detection is a key step in building a secure and reliable system when a user operates the server system. If a hacker uploads a file containing malicious code during an attack, it will pose a huge threat to the computer system and cannot be detected only by file extension. To solve this problem, this paper proposes a novel anomaly upload behavior detection method that establishes an upload behavior detection model by the fuzzy inference algorithm. In general, membership functions of the fuzzy inference algorithm are directly given by expert's experience. Furthermore, we investigate an improved method for determining membership function, which is obtained by statistical and curve fitting of historical data, to facilitate user's real behavior pattern recognition in the upload behavior detection model. This method does not require calibration of historical data and can be well adapted to different application scenarios. We evaluate the performance of our method via extensive simulations and real-world experiments, whose results demonstrate the feasibility and effectiveness of the proposed method.
引用
收藏
页码:923 / 929
页数:7
相关论文
共 50 条
  • [21] FADS: A fuzzy anomaly detection system
    Li, Dan
    Wang, Kefei
    Deogun, Jitender S.
    ROUGH SETS AND KNOWLEDGE TECHNOLOGY, PROCEEDINGS, 2006, 4062 : 792 - 798
  • [22] A Fuzzy Measure for Intrusion and Anomaly Detection
    Aljawarneh, Shadi A.
    RadhaKrishna, V.
    Kumar, G. Rajesh
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2017,
  • [23] TIME SERIES ANOMALY DETECTION BASED ON FUZZY DYNAMIC MARKOV MODEL
    Li, Xudong
    Zhao, Lan
    Gao, Tan
    Chen, Wen
    JOURNAL OF NONLINEAR AND CONVEX ANALYSIS, 2021, 22 (09) : 1821 - 1830
  • [24] Anomaly Detection of Network Traffic Based on Intuitionistic Fuzzy Set Ensemble
    Tian, He
    Guo, Kaihong
    Guan, Xueting
    Wu, Zheng
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2023, E106B (07) : 538 - 546
  • [25] Towards fuzzy anomaly detection-based security: a comprehensive review
    Masdari, Mohammad
    Khezri, Hemn
    FUZZY OPTIMIZATION AND DECISION MAKING, 2021, 20 (01) : 1 - 49
  • [26] Network Traffic Classification for Anomaly Detection Fuzzy Clustering Based Approach
    Asmuss, Julija
    Lauks, Gunars
    2015 12TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2015, : 313 - 318
  • [27] Compound Fuzzy Clustering Anomaly Detection Based on Production Process Coupling
    Fu, Mengyao
    Li, Yangzhao
    Zhang, Mengfan
    Feng, Dongqin
    Chen, Qingyun
    Jiang, Ying
    2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 5708 - 5713
  • [28] Optimization of membership functions in anomaly detection based on fuzzy data mining
    Zhu, TQ
    Xiong, P
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 1987 - 1992
  • [29] Towards fuzzy anomaly detection-based security: a comprehensive review
    Mohammad Masdari
    Hemn Khezri
    Fuzzy Optimization and Decision Making, 2021, 20 : 1 - 49
  • [30] Fuzzy Inference Based Intrusion Detection System: FI-Snort
    Naik, Nitin
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 2066 - 2071